Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3481
Joint effects of temperature and humidity with PM2.5 on COPD
Published 2025-02-01Get full text
Article -
3482
Possible scenarios for the spread of mpox outside the endemic focus in Africa
Published 2025-04-01Get full text
Article -
3483
YHSeqY3000 panel captures all founding lineages in the Chinese paternal genomic diversity database
Published 2025-01-01Get full text
Article -
3484
Coopératives de production : quelle spécificité du rapport social d’activités coopératif à l’aune du rapport salarial ?
Published 2023-07-01“…From the perspective of this theoretical and historical approach to the “cooperative social relationship of activities”, we discuss its capacity to produce forms of social protection and wage security within the enterprise in the face of an increasingly precarious wage labor nexus. …”
Get full text
Article -
3485
Uniform Local Binary Pattern for Fingerprint Liveness Detection in the Gaussian Pyramid
Published 2018-01-01“…Fingerprint recognition schemas are widely used in our daily life, such as Door Security, Identification, and Phone Verification. However, the existing problem is that fingerprint recognition systems are easily tricked by fake fingerprints for collaboration. …”
Get full text
Article -
3486
Radicalization and Counter-Radicalization on the Internet (Roles and Responsibilities of Stakeholders in Countering Cyber Terrorism)
Published 2025-01-01“…The sophistication of terrorists/terrorist organizations in utilizing the internet requires an equally sophisticated response in combating and countering cyberterrorism, combating them requires simultaneous integration of stakeholders in this field, namely law enforcement, academia, businesses (private security industry), society/community, media and internet users.…”
Get full text
Article -
3487
Improving VANETs Connectivity with a Totally Ad Hoc Living Mobile Backbone
Published 2015-01-01“…The vehicular ad hoc network (VANET) for intelligent transportation systems is an emerging concept to improve transportation security, reliability, and management. The network behavior can be totally different in topological aspects because of the mobility of vehicular nodes. …”
Get full text
Article -
3488
Economics of Bulk Storage Techniques: Maize and Cowpea Storage in Ghana
Published 2022-01-01“…High postharvest loss is one of the major challenges faced by farmers in many African countries in their efforts to achieve food and nutrition security. Several postharvest techniques have been developed and introduced to farmers aimed at reducing food losses. …”
Get full text
Article -
3489
India and Russia in International Organizations: Motives, Strategies, and Outcomes
Published 2023-05-01“…Despite Russia's growing proximity to China, Moscow has not compromised its support for New Delhi on issues such as Kashmir, terrorism, membership in the Nuclear Suppliers Group (NSG), and the United Nations Security Council. In contrast, China continues to question and oppose India on these matters. …”
Get full text
Article -
3490
Mining Outlier Data in Mobile Internet-Based Large Real-Time Databases
Published 2018-01-01“…Mining outlier data guarantees access security and data scheduling of parallel databases and maintains high-performance operation of real-time databases. …”
Get full text
Article -
3491
-
3492
Chaotic Image Encryption Based on Running-Key Related to Plaintext
Published 2014-01-01“…In order to solve these problems and further enhance the security of encryption algorithm, based on disturbance and feedback mechanism, we present a new image encryption scheme. …”
Get full text
Article -
3493
Advances in auxin synthesis, transport, and signaling in rice: implications for stress resilience and crop improvement
Published 2025-01-01“…By synthesizing these findings, we provide a comprehensive overview of how auxin research informs strategies for developing rice varieties with enhanced adaptability and optimized growth, contributing to food security and sustainable agriculture.…”
Get full text
Article -
3494
EXPANDING NASA FUNCTIONALITY USING ITS API AND IMPROVING INTEREST AMONG PEOPLE IN SPACE EXPLORATION
Published 2024-12-01“…By leveraging NASA’s API, the platform integrates up-to-date data, while modern approaches to routing, state management, and authentication ensure user convenience and security. A non-relational database is utilized for efficient information storage and accessibility. …”
Get full text
Article -
3495
Sex of Household Heads and Attitude Towards Home Gardening in Southwest, Nigeria
Published 2025-01-01“…Tackling these identified constraints could contribute to improving household perceptions of home gardening, reducing gender disparities in attitudes, and enhancing food security outcomes. …”
Get full text
Article -
3496
The Development and Evolution of the Right to Life in the Inter-American Court of Human Rights
Published 2024-12-01“…Other important characteristic of this paper is that it examines the obligation to investigate, the procedural aspect of the right to life, the interpretation of Article 4 of the American Convention of Human Rights (Right to Life) and the proportionality of the use of the force of security forces in relation with the violation of the right to life. …”
Get full text
Article -
3497
The use of technology in civil and family oral trials as an innovative source of human rights in Mexico
Published 2025-01-01“… The Declaration of the Rights of Man and of the Citizen of 1789 recognizes basic rights, including the right to life, liberty, security, equality, property and the expression of ideas and opinions through the press or any other medium. …”
Get full text
Article -
3498
RUSSIA-EU CUSTOMS COOPERATION LEGAL BASE IN THE CONTEXT OF RUSSIA WTO ACCESSION
Published 2013-12-01“…At the same time it will be important factor for economic, national security as well as for increase of investment attractiveness of Russia.…”
Get full text
Article -
3499
-
3500
RAMS Analysis of Train Air Braking System Based on GO-Bayes Method and Big Data Platform
Published 2018-01-01“…The RAMS (reliability, availability, maintainability, and security) of the air braking system is an important indicator to measure the safety performance of the system; it can reduce the life cycle cost (LCC) of the rail transit system. …”
Get full text
Article